The authors introduce an overview of Internet of Things (IoT) and the concept of Ethical Design which is used to strengthen user interaction with IoT environments. The authors also present the contemporary challenges when dealing with IoT and suggest an implementation of Ethical Design framework called SecKit which can address these current challenges. Moreover, the article analyzes the benefits and limitations of the proposed Ethical Design model and the future development of this model.
The introduction of the article is too long and it is hard to summarize all the mentioned points. It should be split into smaller subtopics. One subtopic could be an introduction to IoT. One subtopic for declaring several aspects of IoT like privacy protection, Digital Divide, controlling flow of data and one subtopic discussing the need of Ethical Design to IoT. Each subtopic will have the title, for example: “Introduction to IoT”, “IoT key aspects”, and “Ethical Design for IoT”.
There is one redundant paragraph “The concept of Ethical Design could be implemented using different technologies. In ‘‘Policy-Based Approach for Ethical Design” section, we describe a potential implementation of the Ethical Design concept using a policy-based framework” – (Baldini et al. – p.9). This paragraph is stated at the end of Ethical Design and Human Agency section and it is redundant because the author already mentioned the content of this section (“Section ‘‘Policy-Based Approach for Ethical Design” describes the proposed technical implementation of the ‘‘Ethical Design’’ through a policy-based framework ”) in the introduction part so there is no need to state it again.
The authors defined the term Internet of Things (IoT) as: “The Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service” and “a world where physical objects are seamlessly integrated into the information network, and where the physical objects can become active participants in business processes” – (Baldini et al. – p.2). For “Ethical design” term, the author defined as “we use the term ‘ethical design’ from an engineering point of view to highlight that the IoT engineers promote a design of the IoT, which is respectful of the rights of the citizens instead of being only driven by economic considerations” – (Baldini et al. – p.2). However, the author did not provide definition for “big data” even though it was mentioned in the article. By this way, the authors assume that the audience have some basic knowledge about big data and its related fields.
The “Main Concepts” section does not describe the concepts in SecKit clearly. Specifically, the authors describe “enforcement” and “configuration” like: “For example, a profile can be specified to restrict the amount of user information accessible to the IoT devices (enforcement) when the user is in a public space that is considered to be a potentially unsafe situation (configuration)” – (Baldini et al. – p.12). The author should spend one or two sentences to explain the definition of concepts “enforcement” and “configuration” more clearly.
The article has good structure consisting of three main parts: the problem formulation (abstract, introduction), the solution to the problem (Policy-Based approach for Ethical Design) as well as the evaluation of the solution (Analysis and comparison with other frameworks). This structure helps the audience to easily follow the article’s content.